A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Latha Yadav, T. R.
- Message Authentication Protocol for Lifetime Proficient Hash Based Algorithm in Wireless Sensor Networks
Authors
1 S.I.E.T, Tumkur, IN
2 A.I.T, Tumkur, IN
3 Dept of CSE, C.I.T, Gubbi, Tumkur, IN
Source
International Journal of Advanced Networking and Applications, Vol 7, No 6 (2016), Pagination: 2963-2966Abstract
Wireless sensor networks are self organized, autonomous, automatic discovery of services, highly scalable, reliable, Infrastructure less service. Mainly applicable in the field of disaster, healthcare. The cryptographic operations such as hash based schemes are more energy consuming (more byte transmitted indirectly consumes more energy). To avoid the energy consumption over a cryptographic operations are design of Message Authentication protocoL for Lifetime enhancement In wireless sensor networks called MALLI, which uses a famous structure of hash algorithm 2AMD-160. To demonstrate that, the execution time and the security achieved by the proposed method are more effective than the MD5 and SHA1.Keywords
Authentication, Hash function, Cryptography, Security, Wireless Sensor Networks (WSN).- Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireless Sensor Networks
Authors
1 S.I.E.T, Tumku, IN
2 A.I.T, Tumkur, IN
3 Dept of CSE, C.I.T, Gubbi, Tumkur, IN
Source
International Journal of Advanced Networking and Applications, Vol 8, No 5 (2017), Pagination: 3209-3212Abstract
Wireless sensor networks are self organized, autonomous, automatic discovery of services, highly scalable, reliable, Infrastructure less service. Mainly applicable in the field of disaster, healthcare. The cryptographic operations such as hash based schemes are more energy consuming (more byte transmitted indirectly consumes more energy). To avoid the energy consumption over a cryptographic operations are design of Markle Tree Based Authentication protocol for Lifetime enhancement in wireless sensor networks called MALLI, which uses a famous structure of hash algorithm. To demonstrate that, the default hash tree and the security achieved by the proposed method are more effective than the existing methodologies.
Keywords
Authentication, Cryptography, Hash Function, Security, Wireless Sensor Networks (WSN).References
- S. Kulkarni, and L. Wang, “MNP: Multihop network reprogramming service for sensor networks”, Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, Columbus Ohio USA, pp. 7-16, Jun 2005.
- T. Stathopoulos, J. Heidemann, and D. Estrin, "A remote code update mechanism for wireless sensor networks", CENS Technical Report 30, University of California UCLA, 2003.
- J. Hui, and D. Culler, “The dynamic behavior of a data dissemination protocol for network programming at scale”, Proceedings of the 2nd international conference on Embedded networked sensor systems, Baltimore MD USA, pp. 81-94, Nov 2004.
- M. Krasniewski, R. Panta, S. Bagchi, C. Yang, and W. Chappell, “Energy-efficient on-demand reprogramming of large-scale sensor networks”, ACM Transactions on Sensor Network, 4(1):1-38, 2008.
- V. Naik, A. Arora, P. Sinha, and H. Zhang, “Sprinkler: A reliable and energy efficient data dissemination service for wireless embedded devices”, Proceedings of the 26th IEEE International Real-Time Systems Symposium, Miami Florida USA, pp. 277-286, Dec 2005.
- R. Panta, I. Khalil, and S. Bagchi, "Stream: Low overhead wireless reprogramming for sensor networks", 26th IEEE International Conference on Computer Communications, pp. 928-936, 2007.
- Ayman Tajeddine Ayman Kayssi Ali Chehab Imad Elhajj, ”Authentication Schemes for Wireless Sensor Networks ”Proceedings of 17th IEEE Mediterranean Electro technical Conference, Beirut, Lebanon, 13-16 April 2014.
- Carlos F. Caloca de la Parra, J. Antonio GarciaMacias,” A Protocol for Secure and Energy-Aware Reprogramming in WSN”, Proceedings of 2009 International Conference on wireless communications and mobile computing connecting the world wirelessly.
- Haider M. AI-Mashhadi, Hala B. Abdul-Wahab , Iraq Rehab F. Hassan ,” Secure and Time Efficient Hashbased Message Authentication Algorithm for Wireless Sensor Networks” Proceedings of IEEE,978-1-47995627-2/14, 2014.
- Lin Xu, Hala Mi Wen, Jinguo Li,” A Bidirectional Broadcasting Authentication Scheme for Wireless Sensor Networks” Proceedings of IEEE,978-1-50900089-0/15, 2015.
- I. S. Alshawi, L. Van, W. Pan and B. Luo, "Lifetime enhancement in wireless sensor networks using fuzzy approach and A-star algorithm," IEEE Sensors J., vol.12, no. 10, pp. 3010-3018, Oct. 2012.
- Trevatha.l., Ghodosi H., and Myers T., "Efficient batch authentication for hierarchical wireless sensor networks," in IEEE ISSNIP, pp. 217-222, 2011. 2014. Teaching and Academic experience of 14 years.
- Life membership in Indian Society for Technical Education (ISTE).
- Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime Enhancement
Authors
1 S.I.E.T, Tumkur, IN
2 A.I.T, Tumkur, IN
3 Dept of CSE, C.I.T, Gubbi, Tumkur, IN
Source
International Journal of Advanced Networking and Applications, Vol 8, No 6 (2017), Pagination: 3270-3273Abstract
Remote sensor systems are self sorted out, self-governing, programmed revelation of administrations, exceedingly versatile, solid, Infrastructure less administration. Predominantly material in the field of debacle, social insurance. Secure spread of code updates in Wireless Sensor Network is testing assignment. Programming refreshes in Wireless Sensor Networks is accepting huge consideration as of late as it expands the lifetime of the system. Because of the expansive number of hubs, it is illogical to refresh the product physically on account of the size of such arrangements and the physical unavailability of certain sensor hubs. For certain WSN applications, securing the procedure of remote reconstructing is fundamental. For instance, code refreshes in military applications must be confirmed to maintain a strategic distance from the download of malignant code into conveyed sensor hubs. Also, applications that require protection and obscurity ought not concede code refreshes that can reinvent the WSN to snoop on focuses without authorization. Given the presumption that more bytes transmitted means in a roundabout way more vitality squandered in the spread, vitality proficiency is accomplished by lessening the rate of overhead hash bytes per page.
This work proposes two security systems for validation of secure spread. The protected dispersal manage safely sharing information between neighboring hubs, which manages two security systems: honesty and privacy. The point is to accomplish exchange off between the security and vitality.
Keywords
Authentication, Hash Function, Cryptography, Security, Wireless Sensor Networks (WSN).References
- S. Kulkarni, and L. Wang, “MNP: Multihop network reprogramming service for sensor networks”, Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, Columbus Ohio USA, pp. 7-16, Jun 2005.
- T. Stathopoulos, J. Heidemann, and D. Estrin, "A remote code update mechanism for wireless sensor networks", CENS Technical Report 30, University of California UCLA, 2003.
- J. Hui, and D. Culler, “The dynamic behavior of a data dissemination protocol for network programming at scale”, Proceedings of the 2nd international conference on Embedded networked sensor systems, Baltimore MD USA, pp. 81-94, Nov 2004.
- M. Krasniewski, R. Panta, S. Bagchi, C. Yang, and W. Chappell, “Energy-efficient on-demand reprogramming of large-scale sensor networks”, ACM Transactions on Sensor Network, 4(1):1-38, 2008.
- V. Naik, A. Arora, P. Sinha, and H. Zhang, “Sprinkler: A reliable and energy efficient data dissemination service for wireless embedded devices”, Proceedings of the 26th IEEE International Real-Time Systems Symposium, Miami Florida USA, pp. 277-286, Dec 2005.
- R. Panta, I. Khalil, and S. Bagchi, "Stream: Low overhead wireless reprogramming for sensor networks", 26th IEEE International Conference on Computer Communications, pp. 928-936, 2007.
- Ayman Tajeddine Ayman Kayssi Ali Chehab Imad Elhajj, ”Authentication Schemes for Wireless Sensor Networks ”Proceedings of 17th IEEE Mediterranean Electro technical Conference, Beirut, Lebanon, 13-16 April 2014.
- Carlos F. Caloca de la Parra, J. Antonio GarciaMacias,” A Protocol for Secure and Energy-Aware Reprogramming in WSN”, Proceedings of 2009 International Conference on wireless communications and mobile computing connecting the world wirelessly.
- Haider M. AI-Mashhadi, Hala B. Abdul-Wahab , Iraq Rehab F. Hassan ,” Secure and Time Efficient Hash-based Message Authentication Algorithm for Wireless Sensor Networks” Proceedings of IEEE,978-1-4799-5627-2/14, 2014.
- I. S. Alshawi, L. Van, W. Pan and B. Luo, "Lifetime enhancement in wireless sensor networks using fuzzy approach and A-star algorithm," IEEE Sensors J., vol. 12, no. 10, pp. 3010-3018, Oct. 2012.
- Trevatha.l., Ghodosi H., and Myers T., "Efficient batch authentication for hierarchical wireless sensor networks," in IEEE ISSNIP, pp. 217-222, 2011.
- Enhanced Security for Non English Users of Wireless Sensor Networks
Authors
1 S.I.E.T, Tumkur, Visvesvaraya Technological University, Belgavi, IN
2 A.I.T, Tumkur, Visvesvaraya Technological University, Belgavi, IN
3 Dept. Of CSE, Channabasaveshwara Institute of Technology, Gubbi, Tumkur, IN
Source
International Journal of Advanced Networking and Applications, Vol 9, No 4 (2018), Pagination: 3498-3501Abstract
Wireless Sensor Networks is an infrastructure less, self-configured, reprogrammable, energy-aware network used in various applications. Many networks works on security of data including mainly ASCII values but not the non English end users. BDNA cryptography describes how to encrypt non English patterns but which leads to propagation of more bits transmitted means indirectly consumes more energy in WSN. In this we propose new steps to reduce the transmission of more bytes in the network. This gives high propagation speed in the network with minimum hash overhead.Keywords
BDNA, Sensor Networks, MD5.References
- Ayman Tajeddine Ayman Kayssi Ali Chehab Imad Elhajj, ”Authentication Schemes for Wireless Sensor Networks ”Proceedings of 17th IEEE Mediterranean Electro technical Conference, Beirut, Lebanon, 13-16 April 2014.
- Prajapati Ashishkumar B, Prajapati Barkha, 2016.Implementation of DNA Cryptography in Cloud Computing and Using socket Programming. IEEE, New Delhi, Jan 2016, p. 07-09.
- Carlos F. Caloca de la Parra, J. Antonio GarciaMacias,” A Protocol for Secure and Energy-Aware Reprogramming in WSN”, Proceedings of 2009 International Conference on wireless communications and mobile computing connecting the world wirelessly.
- Haider M. AI-Mashhadi, Hala B. Abdul-Wahab , Iraq Rehab F. Hassan ,” Secure and Time Efficient Hashbased Message Authentication Algorithm for Wireless Sensor Networks” Proceedings of IEEE,978-1-47995627-2/14, 2014.
- I. S. Alshawi, L. Van, W. Pan and B. Luo, "Lifetime enhancement in wireless sensor networks using fuzzy approach and A-star algorithm," IEEE Sensors J., vol. 12, no. 10, pp. 3010-3018, Oct. 2012.
- Trevatha.l., Ghodosi H., and Myers T., "Efficient batch authentication for hierarchical wireless sensor networks," in IEEE ISSNIP, pp. 217-222, 2011.
- Ayman Tajeddine Ayman Kayssi Ali Chehab Imad Elhajj, ”Authentication Schemes for Wireless Sensor Networks ”Proceedings of 17th IEEE Mediterranean Electro technical Conference, Beirut, Lebanon, 13-16 April 2014.
- Haider M. AI-Mashhadi, Hala B. Abdul-Wahab , Iraq Rehab F. Hassan ,” Secure and Time Efficient Hashbased Message Authentication Algorithm for Wireless Sensor Networks” Proceedings of IEEE,978-1-47995627-2/14, 2014
- Trevatha.l., Ghodosi H., and Myers T., "Efficient batch authentication for hierarchical wireless sensor networks," in IEEE ISSNIP 2011, pp. 217-222.
- M. A. Simplicio, et aI., "Comparison of authenticatedencryption schemes in wireless sensor networks," in IEEE LCN 2011, pp. 450- 457.
- Y. Shuai, et aI., "A new design of security wireless sensor network using efficient key management scheme," in IEEE NIDC 20 I 0, pp. 504-508.